US10839619B2 - Electronic control unit and method for connection authentication - Google Patents

Electronic control unit and method for connection authentication Download PDF

Info

Publication number
US10839619B2
US10839619B2 US16/249,661 US201916249661A US10839619B2 US 10839619 B2 US10839619 B2 US 10839619B2 US 201916249661 A US201916249661 A US 201916249661A US 10839619 B2 US10839619 B2 US 10839619B2
Authority
US
United States
Prior art keywords
electronic control
outside device
control unit
connection request
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US16/249,661
Other languages
English (en)
Other versions
US20190236856A1 (en
Inventor
Shu ISHIZUKA
Masashi AMESARA
Toshio Kawamura
Yasuhiro Yamasaki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toyota Motor Corp
Original Assignee
Toyota Motor Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toyota Motor Corp filed Critical Toyota Motor Corp
Assigned to TOYOTA JIDOSHA KABUSHIKI KAISHA reassignment TOYOTA JIDOSHA KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AMESARA, Masashi, ISHIZUKA, Shu, KAWAMURA, TOSHIO, YAMASAKI, YASUHIRO
Publication of US20190236856A1 publication Critical patent/US20190236856A1/en
Application granted granted Critical
Publication of US10839619B2 publication Critical patent/US10839619B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/008Registering or indicating the working of vehicles communicating information to a remotely located station
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R16/00Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
    • B60R16/02Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
    • B60R16/023Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for transmission of signals between vehicle parts or subsystems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R16/00Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
    • B60R16/02Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
    • B60R16/023Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements for transmission of signals between vehicle parts or subsystems
    • B60R16/0231Circuits relating to the driving or the functioning of the vehicle
    • B60R16/0232Circuits relating to the driving or the functioning of the vehicle for measuring vehicle parameters and indicating critical, abnormal or dangerous conditions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0808Diagnosing performance data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • H04L41/0809Plug-and-play configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2205/00Indexing scheme relating to group G07C5/00
    • G07C2205/02Indexing scheme relating to group G07C5/00 using a vehicle scan tool

Definitions

  • the present disclosure relates to an electronic control unit and a method for connection authentication.
  • a vehicle is equipped with a plurality of electronic control units for controlling a powertrain system (such as an engine, a transmission, and an anti-lock brake system), body-related components (such as doors, seats, and mirrors), multi-media systems (such as a navigation system and an audio system), and various sensors.
  • the electronic control units are connected with each other through an on-board network (such as a controller area network or an Ethernet network) to control each unit of the vehicle while sharing information with each other.
  • a diagnostic tool is used as a tool for supporting a maintenance management operation.
  • the maintenance management operation includes collecting information about failure diagnosis of the electronic control units or on-board components under the electronic control units, and rewriting programs in a flash memory mounted on each of the electronic control units.
  • JP 2016-48848 A proposes that all the following conditions are to be satisfied as a permission condition for permitting connection of the diagnostic tool to the on-board network.
  • the conditions include: (a) an authentication code included in a communication frame that is transmitted from the diagnostic tool matches an authentication code stored in a corresponding electronic control unit; (b) a correspondence relation between the authentication code and a connection target code included in the communication frame that is transmitted from the diagnostic tool matches a correspondence relation between the authentication code and a connection target code stored in the corresponding electronic control unit; and (c) the connection target code included in the communication frame that is transmitted from the diagnostic tool is the connection target code supportable by the corresponding electronic control unit.
  • a permission condition it can be estimated that a connection request received is the request sent from the diagnostic tool of an official operator (for example, a dealer). This makes it possible to disconnect connection requests sent from the diagnostic tools of unofficial operators.
  • the communication state between a diagnostic tool and an electronic control unit turns into a linkup state when an activation line transits from non-active to active. Accordingly, when a large amount of communication frames are transmitted from the diagnostic tool, the on-board electronic control unit may fall into a hang-up state.
  • the vehicle is in automatic driving in particular, hardware resources of the on-board electronic control unit are consumed in considerable amounts. Under such circumstances, it becomes difficult to determine propriety of a connection request appropriately.
  • the diagnostic tool makes a connection request to the on-board network while a signal with a high safety request level is being transmitted on the on-board network, or while the vehicle is traveling, it becomes difficult to determine the propriety of the connection request.
  • the present disclosure proposes an electronic control unit and a method for connection authentication reducing the possibility of permitting an illegal connection request from an outside device even when such an illegal connection request is made while the resource of the on-board electronic control unit is being consumed.
  • a first aspect of the disclosure provides an electronic control unit mounted on a vehicle.
  • the electronic control unit includes a processor configured to: detect a connection request from an outside device; determine, in response to the connection request, whether or not a start condition for starting a connection authentication process is satisfied, the connection authentication process being a process for determining propriety of the connection request from the outside device; control a communication state between the outside device and the electronic control unit such that the communication state becomes a linkup state when the start condition is satisfied; and start the connection authentication process when the communication state is the linkup state.
  • a second aspect of the disclosure provides a method for connection authentication.
  • the method for connection authentication includes: detecting a connection request from an outside device to an on-board network; determining, in response to the connection request, whether or not a start condition for starting a connection authentication process is satisfied, the connection authentication process being a process for determining propriety of the connection request from the outside device; controlling a communication state between the outside device and the on-board network such that the communication state becomes a linkup state when the start condition is satisfied; and starting the connection authentication process when the communication state is the linkup state.
  • FIG. 1 is an explanatory view showing the configuration of an on-board network according to an embodiment of the present disclosure
  • FIG. 2 is a functional block diagram of the electronic control unit according to the embodiment of the present disclosure.
  • FIG. 3 is a flowchart showing a process flow of a method for connection authentication according to the embodiment of the present disclosure.
  • FIG. 1 is an explanatory view showing the configuration of an on-board network 100 according to an embodiment of the present disclosure.
  • the on-board communication network 100 includes a plurality of concentrators 21 , 22 that connects a plurality of electronic control units 31 to 38 mounted on a vehicle 200 .
  • an Ethernet cable in conformity to 100Base-T1 standards may be used, for example.
  • an Ethernet switch having a bridging function can be used, for example.
  • the electronic control units 31 to 38 controls a powertrain system of a vehicle (such as an engine, a transmission, and an anti-lock brake system), body-related components (such as doors, seats, and mirrors), multi-media systems (such as a navigation system, and an audio system), or various sensors.
  • a powertrain system of a vehicle such as an engine, a transmission, and an anti-lock brake system
  • body-related components such as doors, seats, and mirrors
  • multi-media systems such as a navigation system, and an audio system
  • the vehicle 200 includes a connector 50 for connecting an outside device 40 .
  • the connector 50 conforms to, for example, International Organization for Standardization (ISO) 15031-3 standards, or United States Society of Automotive Engineers (SAE) J1962 standards.
  • the outside device 40 is a diagnostic tool that performs diagnosis communication for maintenance management of the vehicle 200 .
  • the diagnosis communication includes communication for requesting transmission of self-diagnostic message information to the electronic control units 31 to 38 from the diagnostic tool, or for transmitting, in response to the request, the self-diagnostic message information to the diagnostic tool from the electronic control, units 31 to 38 .
  • the self-diagnostic message information refers to the information related to failure diagnosis of the electronic control units 31 to 38 or the components (for example, sensors, actuators, and the like) under the electronic control units 31 to 38 .
  • the diagnosis communication also includes communication for rewriting programs in the flash memories mounted on the electronic control units 31 to 38 .
  • the vehicle 200 includes a communication line 61 for communication with the outside device 40 , and an activation line 62 for detecting a connection request from the outside device 40 .
  • the activation line 62 is designed to conform to ISO 13400 standards.
  • the activation line 62 transits from non-active to active when the outside device 40 is connected to the connector 50 .
  • As the communication line 61 an Ethernet cable in conformity to 100Base-TX standards can be used, for example.
  • the concentrator 21 includes an electronic control unit 10 that performs a connection authentication process for determining the propriety of a connection request from the outside device 40 .
  • the electronic control unit 10 is a computer system including a communication interface (for example, an Ethernet transceiver, an Ethernet controller, or the like) 11 connected to the communication line 61 and the activation line 62 , a processor 12 , and a storage device 13 .
  • the storage device 13 stores a computer program (hereinafter referred to as “connection authentication program”) describing a command for executing the connection authentication process.
  • the processor 12 performs the connection authentication process by interpreting and executing the connection authentication program.
  • FIG. 2 is a functional block diagram of the electronic control unit 10 according to the embodiment of the present disclosure.
  • the processor 12 interprets and executes the connection authentication program, various functions of a detection unit 71 , a determination unit 72 , a controller 73 , an authentication unit 74 , and a storage unit 75 are implemented.
  • the various functions are implemented by collaboration between hardware resources of the electronic control unit 10 and the connection authentication program stored in the storage device 13 .
  • the details of the functions will be described later.
  • the connection authentication program may include, for example, a plurality of software modules that are invoked and executed in a main program. Such software modules are subprograms modularized for executing the processes that implement the various functions.
  • the functions similar to the various functions may be implemented by using dedicated hardware resources (for example, an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA), or the like) or firmware.
  • the storage device 13 is a computer-readable storage medium, such as a semiconductor memory or a disc medium, for example.
  • the detection unit 71 determines that a connection request from the outside device 40 to the electronic control unit 10 is received, when the activation line 62 transits from non-active to active.
  • the determination unit 72 determines whether or not a start condition for starting the connection authentication process of the outside device 40 is satisfied.
  • the start condition refers to a condition for starting the connection authentication process of the outside device 40 without the possibility of the vehicle 200 permitting an illegal connection request even when the illegal connection request is made by the outside device 40 .
  • the start condition is to satisfy at least one condition out of: (i) the vehicle 200 is not in automatic driving; (ii) the travel speed of the vehicle 200 is less than a threshold speed (for example, 5 km/h); and (iii) a signal related to operation control of the vehicle 200 that is transmitted on the on-board network 100 has a safety request level less than a threshold level.
  • a safety request level an automotive safety integrity level ASIL defined by ISO 26262 can be used, for example.
  • the threshold level the level same as the ASIL that corresponds to the risk of severe or life-threatening failure may be used, for example.
  • the controller 73 controls the communication state between the outside device 40 and the electronic control unit 10 to a link-down state, until the start condition is determined to be satisfied.
  • connection authentication does not start when the vehicle 200 is in automatic driving, or when the travel speed of the vehicle 200 is faster than a threshold value, for example. Accordingly, safety and performance is further enhanced.
  • the controller 73 controls the communication state between the outside device 40 and the electronic control unit 10 to a linkup state.
  • the authentication unit 74 starts a connection authentication process for determining the propriety of the connection request from the outside device 40 .
  • the authentication unit 74 may authenticate whether or not the connection request is from the diagnostic tool of an official operator (for example, dealer) by a publicly-known method (for example, a method disclosed in JP2016-48848 A).
  • Whether or not the vehicle 200 is in automatic driving may be determined based on flag information (flag information indicating that the vehicle is in automatic driving) that is transmitted from an electronic control unit related to automatic driving control.
  • Whether or not the travel speed of the vehicle 200 exceeds a threshold speed may be determined based on flag information (flag information indicating that the travel speed of the vehicle 200 exceeds the threshold value) that is transmitted from an electronic control unit related to measurement of the vehicle speed.
  • Whether or not a signal, related to driving control of the vehicle 200 , transmitted on the on-board network 100 has a safety request level exceeding a threshold level may be determine based on flag information (flag information indicating that the safety request level of the signal related to the operation control of the vehicle 200 exceeds the threshold level) that is transmitted from an electronic control unit related to processing of the signal having a safety request level exceeding the threshold level.
  • flag information is periodically transmitted from each of the electronic control units through the on-board network 100 .
  • the storage unit 75 stores a history of such flag information in time series.
  • the storage unit 75 stores a history of the state transition (transition from non-active to active, and transition from active to non-active) of the activation line 62 in time series.
  • the storage unit 75 stores a history of information indicating whether or not the start condition is satisfied in time series.
  • the start condition for starting the connection authentication process of the outside device 40 may also include (iv) when the start condition is not satisfied at the time of a connection request from the outside device 40 , a predetermined time has elapsed after the connection request, in addition to the aforementioned conditions (i) to (iii).
  • the determination unit 72 can determine whether or not the condition (iv) is satisfied from various kinds of serial information stored in the storage unit 75 .
  • FIG. 3 is a flowchart showing the process flow of a method for connection authentication according to the embodiment of the present disclosure. Since the outline of each process shown in FIG. 3 is overlapped with the description of FIG. 2 , simple description will be given here.
  • step 301 the electronic control unit 10 determines whether or not a connection request from the outside device 40 to the on-board network 100 is received.
  • the activation line 62 transits from non-active to active, the electronic control unit 10 determines that the connection request from the outside device 40 to the electronic control unit 10 is received.
  • step 302 the electronic control unit 10 determines whether or not the start condition for starting the connection authentication process of the outside device 40 is satisfied.
  • the electronic control unit 10 determines whether or not at least one of the conditions (i) to (iii) is satisfied, or whether or not at least one of the conditions (i) to (iv) satisfied based on the flag information transmitted on the on-board communication network 100 .
  • step 303 the electronic control unit 10 controls the communication state between to outside device 40 and the electronic control unit 10 from a link-down state to a linkup state.
  • the communication state between the outside device 40 and the electronic control unit 10 is the link-down state, until the start condition is determined to be satisfied.
  • step 304 the electronic control unit 10 starts a connection authentication process for determining the propriety of the connection request from the outside device 40 .
  • a publicly-known method can be used as the connection authentication process.
  • step 305 the electronic control unit performs communication (for example, diagnosis communication) with the outside devices 40 through the communication line 61 .
  • step 306 the electronic control unit 10 determines whether or not the communication with the outside devices 40 is ended.
  • step 307 the electronic control unit 10 controls the communication state between the outside device 40 and the electronic control unit 10 to the link-down state.
  • the electronic control unit 10 determines whether or not the start condition for starting the connection authentication process of the outside device 40 is satisfied (step 302 ).
  • the electronic control unit 10 controls the communication state between the outside device 40 and the electronic control unit 10 to the linkup state (step 303 ), and starts the connection authentication process for determining the propriety of the connection request from the outside device 40 (step 304 ).
  • the electronic control unit 10 that performs the connection authentication process for determining the propriety of a connection request from the outside device 40 is incorporated in the concentrator 21 .
  • any one electronic control unit out of the electronic control units 31 to 34 connected to the concentrator 21 may perform the connection authentication process for determining the propriety of the connection request from the outside device 40 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Mechanical Engineering (AREA)
  • Automation & Control Theory (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
US16/249,661 2018-01-26 2019-01-16 Electronic control unit and method for connection authentication Active US10839619B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2018-011661 2018-01-26
JP2018011661A JP7037748B2 (ja) 2018-01-26 2018-01-26 電子制御ユニット及び接続認証方法

Publications (2)

Publication Number Publication Date
US20190236856A1 US20190236856A1 (en) 2019-08-01
US10839619B2 true US10839619B2 (en) 2020-11-17

Family

ID=67392363

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/249,661 Active US10839619B2 (en) 2018-01-26 2019-01-16 Electronic control unit and method for connection authentication

Country Status (3)

Country Link
US (1) US10839619B2 (zh)
JP (1) JP7037748B2 (zh)
CN (1) CN110087209A (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7097347B2 (ja) * 2019-12-25 2022-07-07 本田技研工業株式会社 不正診断機検出装置
CN111355778B (zh) * 2020-02-17 2022-07-05 威马智慧出行科技(上海)有限公司 诊断设备、车端设备及诊断方法
FR3111511B1 (fr) * 2020-06-15 2022-05-06 Psa Automobiles Sa Procédé et dispositif de communication entre deux véhicules
CN112572345B (zh) * 2020-12-04 2022-03-22 浙江吉利控股集团有限公司 一种混合动力汽车远程启动的方法及系统

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002176430A (ja) 2000-12-06 2002-06-21 Auto Network Gijutsu Kenkyusho:Kk 車両用通信制御装置
US7327227B2 (en) * 2003-11-04 2008-02-05 Kabushiki Kaisha Tokai Rika Denki Seisakusho Vehicle security device and ID code management device
US20110231055A1 (en) * 2010-03-18 2011-09-22 Assetworks Inc. Maintenance system and method for vehicle fleets
US20120035804A1 (en) * 2010-08-03 2012-02-09 Spx Corporation Diagnostic Tool with Recessed Connector
US8583317B2 (en) * 2010-10-19 2013-11-12 Toyota Jidosha Kabushiki Kaisha In-vehicle device, vehicle authentication system and data communication method
US20140277915A1 (en) * 2013-03-15 2014-09-18 Service Solutions U.S. Llc Smart Power Management System and Method Thereof
US20140316621A1 (en) * 2013-04-17 2014-10-23 Ford Global Technologies, Llc Laser ignition system based diagnostics
US20150263860A1 (en) * 2014-03-13 2015-09-17 GM Global Technology Operations LLC Controlling access to personal information stored in a vehicle using a cryptographic key
US20150351137A1 (en) * 2013-02-08 2015-12-03 Bayerische Motoren Werke Aktiengesellschaft Method and Device for Connecting a Diagnostic Unit to a Control Unit in a Motor Vehicle
US20160026787A1 (en) * 2014-07-25 2016-01-28 GM Global Technology Operations LLC Authenticating messages sent over a vehicle bus that include message authentication codes
US20160065298A1 (en) 2014-08-27 2016-03-03 Denso Corporation Relay apparatus
US9280653B2 (en) * 2011-10-28 2016-03-08 GM Global Technology Operations LLC Security access method for automotive electronic control units
US9425963B2 (en) * 2014-03-21 2016-08-23 GM Global Technology Operations LLC Securing electronic control units using message authentication codes
US9460567B2 (en) * 2014-07-29 2016-10-04 GM Global Technology Operations LLC Establishing secure communication for vehicle diagnostic data
US20160381055A1 (en) * 2015-06-29 2016-12-29 Argus Cyber Security Ltd. System and method for providing security to a communication network
US20170193576A1 (en) * 2015-12-30 2017-07-06 Bosch Automotive Service Solutions Inc. Targeted Messaging System
JP2017123570A (ja) 2016-01-07 2017-07-13 株式会社デンソー 中継装置及び通信システム
US20180190043A1 (en) * 2016-12-29 2018-07-05 Bosch Automotive Service Solutions Inc. Mileage Tracking Provisioning
US20180225891A1 (en) * 2017-02-08 2018-08-09 Automatic Labs, Inc. Automated vehicle discovery after connecting to an automotive diagnostic port
US20180227306A1 (en) * 2017-02-09 2018-08-09 Neil L. Borkowicz Security gateway module for on-board diagnostics port of a vehicle
US20180254903A1 (en) * 2017-03-01 2018-09-06 Ford Global Technologies, Llc End-to-end vehicle secure ecu unlock in a semi-offline environment
US10228903B2 (en) * 2013-07-19 2019-03-12 Samsung Electronics Co., Ltd. Method and device for communication
US20190081960A1 (en) * 2017-09-11 2019-03-14 GM Global Technology Operations LLC Systems and methods for in-vehicle network intrusion detection
US20190081966A1 (en) * 2017-09-11 2019-03-14 GM Global Technology Operations LLC Systems and methods for in-vehicle network intrusion detection
US20190222484A1 (en) * 2011-11-16 2019-07-18 Autoconnect Holdings Llc Vehicle middleware

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013051122A1 (ja) 2011-10-05 2013-04-11 トヨタ自動車株式会社 車載ネットワークシステム
JP6201962B2 (ja) 2014-11-06 2017-09-27 トヨタ自動車株式会社 車載通信システム
US9868418B2 (en) * 2016-05-12 2018-01-16 Ford Global Technologies, Llc Vehicle network communication protection
KR101875438B1 (ko) 2016-06-16 2018-08-02 현대자동차주식회사 통신 제어 장치, 그를 가지는 차량 및 그 제어 방법

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002176430A (ja) 2000-12-06 2002-06-21 Auto Network Gijutsu Kenkyusho:Kk 車両用通信制御装置
US7327227B2 (en) * 2003-11-04 2008-02-05 Kabushiki Kaisha Tokai Rika Denki Seisakusho Vehicle security device and ID code management device
US20110231055A1 (en) * 2010-03-18 2011-09-22 Assetworks Inc. Maintenance system and method for vehicle fleets
US20120035804A1 (en) * 2010-08-03 2012-02-09 Spx Corporation Diagnostic Tool with Recessed Connector
US8583317B2 (en) * 2010-10-19 2013-11-12 Toyota Jidosha Kabushiki Kaisha In-vehicle device, vehicle authentication system and data communication method
US9280653B2 (en) * 2011-10-28 2016-03-08 GM Global Technology Operations LLC Security access method for automotive electronic control units
US20190222484A1 (en) * 2011-11-16 2019-07-18 Autoconnect Holdings Llc Vehicle middleware
US20150351137A1 (en) * 2013-02-08 2015-12-03 Bayerische Motoren Werke Aktiengesellschaft Method and Device for Connecting a Diagnostic Unit to a Control Unit in a Motor Vehicle
US20140277915A1 (en) * 2013-03-15 2014-09-18 Service Solutions U.S. Llc Smart Power Management System and Method Thereof
US20140316621A1 (en) * 2013-04-17 2014-10-23 Ford Global Technologies, Llc Laser ignition system based diagnostics
US10228903B2 (en) * 2013-07-19 2019-03-12 Samsung Electronics Co., Ltd. Method and device for communication
US20150263860A1 (en) * 2014-03-13 2015-09-17 GM Global Technology Operations LLC Controlling access to personal information stored in a vehicle using a cryptographic key
US9425963B2 (en) * 2014-03-21 2016-08-23 GM Global Technology Operations LLC Securing electronic control units using message authentication codes
US20160026787A1 (en) * 2014-07-25 2016-01-28 GM Global Technology Operations LLC Authenticating messages sent over a vehicle bus that include message authentication codes
US9460567B2 (en) * 2014-07-29 2016-10-04 GM Global Technology Operations LLC Establishing secure communication for vehicle diagnostic data
JP2016048848A (ja) 2014-08-27 2016-04-07 株式会社デンソー 中継装置
US20160065298A1 (en) 2014-08-27 2016-03-03 Denso Corporation Relay apparatus
US20160381055A1 (en) * 2015-06-29 2016-12-29 Argus Cyber Security Ltd. System and method for providing security to a communication network
US20170193576A1 (en) * 2015-12-30 2017-07-06 Bosch Automotive Service Solutions Inc. Targeted Messaging System
JP2017123570A (ja) 2016-01-07 2017-07-13 株式会社デンソー 中継装置及び通信システム
US20180190043A1 (en) * 2016-12-29 2018-07-05 Bosch Automotive Service Solutions Inc. Mileage Tracking Provisioning
US20180225891A1 (en) * 2017-02-08 2018-08-09 Automatic Labs, Inc. Automated vehicle discovery after connecting to an automotive diagnostic port
US20180227306A1 (en) * 2017-02-09 2018-08-09 Neil L. Borkowicz Security gateway module for on-board diagnostics port of a vehicle
US20180254903A1 (en) * 2017-03-01 2018-09-06 Ford Global Technologies, Llc End-to-end vehicle secure ecu unlock in a semi-offline environment
US20190081960A1 (en) * 2017-09-11 2019-03-14 GM Global Technology Operations LLC Systems and methods for in-vehicle network intrusion detection
US20190081966A1 (en) * 2017-09-11 2019-03-14 GM Global Technology Operations LLC Systems and methods for in-vehicle network intrusion detection

Also Published As

Publication number Publication date
JP7037748B2 (ja) 2022-03-17
US20190236856A1 (en) 2019-08-01
CN110087209A (zh) 2019-08-02
JP2019129495A (ja) 2019-08-01

Similar Documents

Publication Publication Date Title
US10839619B2 (en) Electronic control unit and method for connection authentication
CN112004730B (zh) 车辆控制装置
US10055904B2 (en) Vehicle gateway network protection
US20180154906A1 (en) Autonomous vehicle processor self-diagnostic
US10611381B2 (en) Decentralized minimum risk condition vehicle control
US6321148B1 (en) Vehicle communication control apparatus and method
US20150200825A1 (en) Transceiver integrated circuit device and method of operation thereof
US20200223383A1 (en) Hybrid power network for a vehicle
CN113359759A (zh) 基于自动驾驶的泊车控制方法、系统、车辆及存储介质
WO2023005638A1 (zh) 辅助驾驶方法、装置、设备及存储介质
US10486626B2 (en) Systems and methods for vehicle diagnostic tester coordination
US9174651B2 (en) Method and circuit arrangement in an electronic control unit of a motor vehicle for detecting faults
CN112109726A (zh) 自动驾驶车辆的故障处理方法、车辆及可读存储介质
US20220250655A1 (en) Mobility control system, method, and program
CN111988194B (zh) 汽车线路的诊断方法及装置
CN112550313A (zh) 通过云计算的容错嵌入式汽车应用程序
CN109094536B (zh) 一种车辆控制方法及装置、一种车辆
WO2019193845A1 (ja) 電子制御装置および電子制御システム
JP5223512B2 (ja) 車両用異常解析システム、車両用異常解析方法、及び車両用故障解析装置
US11713058B2 (en) Vehicle control system, attack judging method, and recording medium on which program is recorded
JP2013129291A (ja) 車両用通信制御装置、車両用通信ネットワークの制御方法、車両用通信ネットワークの制御プログラム
US9187070B2 (en) System and method for maintaining operational states of vehicle remote actuators during failure conditions
JPH11230868A (ja) 車両用診断装置
EP4007241B1 (en) Communication apparatus, vehicle, system, and determination method
JP7495890B2 (ja) 車載型コンピュータシステムおよび自動運転支援システム

Legal Events

Date Code Title Description
AS Assignment

Owner name: TOYOTA JIDOSHA KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISHIZUKA, SHU;AMESARA, MASASHI;KAWAMURA, TOSHIO;AND OTHERS;REEL/FRAME:048082/0285

Effective date: 20181127

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4